This is the fourth and last in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP on...

Part 3 of 4 This is the third in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP...

Recently there was a terrific article by Chris Preimesberger in eWEEK , Why Software-Defined Perimeters Outflank VPNs for Secure Remote Access, that examined the emergence of software-defined perimeters (SDP) as a more secure solution for VPNs. As a pioneer and...

This is the second in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP on...

This is the first in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP on...

In the latest stunning security breach, this one disclosed by Marriott, the personal data of 500 million customers has been compromised. Of even greater concern is the fact that the hackers had penetrated and moved freely within the hotel giants’ systems for nearly...

Cisco was in the news recently when it announced the purchase of IAM company Duo Security for $2.3 billion. The move fortified Cisco’s ability to provide IAM and other security features to customers at a time when cloud and mobile computing have all but erased the...

Look beyond testing and compliance As the IoT and thousands of new IP devices grows exponentially, so do the security risks in variety of critical areas including physical security controls. An article in FCW recently outlined increasing risks posed by doors,...

A recent NPR story outlined alarming election security issues on a variety of fronts. The story recounted individual security incidents impacting private companies specializing in products and services ranging from election systems and technologies to voting machines...

Recently the Senate Select Committee on Intelligence released a set of recommendations to combat efforts by hostile states to interfere with U.S. elections. The committee’ draft recommendations cover six areas and include guidance on deterrence, information...

In Part 1 last week, I made the case that Forrester’s concept of Zero Trust has key limitations and that only through the use of SDPs can Zero Trust be truly effective. Part 2 of 2 A software-defined perimeter (SDP) dynamically creates one-to-one connections between...

Part 1 of 2 In 2010, Forrester introduced the concept of the “The Zero Trust Network.” Essentially Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must...

In an effort to bring enterprise-wide security to all its agencies, and in conjunction with its migration of services to the cloud, leaders in Pennsylvania’s Office of Administration recently deployed a risk-based multi-factor authentication (RBMFA) system for...